Home
last modified time | relevance | path

Searched refs:optional (Results 1 – 18 of 18) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/custom_type/
H A Dder_decode_custom_type.c177 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
188 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
199 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
211 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
223 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
235 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
246 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
256 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
268 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
280 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
[all …]
H A Dder_length_custom_type.c61 if (!list[i].used && list[i].optional) continue; in der_length_custom_type()
/optee_os/mk/
H A Daosp_optee.mk145 LOCAL_MODULE_TAGS := optional
181 LOCAL_MODULE_TAGS := optional
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Decc_import_x509.c54 seq_ecparams[5].optional = 1; in s_ecc_import_x509_with_curve()
62 seq_curve[2].optional = 1; in s_ecc_import_x509_with_curve()
H A Decc_import_openssl.c72 seq_ecparams[5].optional = 1; in s_ecc_import_private_with_curve()
80 seq_curve[2].optional = 1; in s_ecc_import_private_with_curve()
/optee_os/core/drivers/crypto/crypto_api/acipher/
H A Drsa.c424 if (rsa->optional.ssa_sign) in crypto_acipher_rsassa_sign()
425 ret = rsa->optional.ssa_sign(&rsa_ssa); in crypto_acipher_rsassa_sign()
502 if (rsa->optional.ssa_verify) in crypto_acipher_rsassa_verify()
503 ret = rsa->optional.ssa_verify(&rsa_ssa); in crypto_acipher_rsassa_verify()
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/
H A Dder_length_sequence.c48 if (!list[i].used && list[i].optional) continue; in der_length_sequence_ex()
/optee_os/core/drivers/crypto/versal/
H A Drsa.c330 .optional.ssa_verify = do_ssa_verify,
331 .optional.ssa_sign = do_ssa_sign,
/optee_os/core/drivers/crypto/crypto_api/include/
H A Ddrvcrypt_acipher.h104 } optional; member
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_pk.h544 int optional; member
561 LTC_TMPVAR(SA_list)[LTC_TMPVAR(SA)].optional = 0; \
/optee_os/core/drivers/crypto/se050/core/
H A Drsa.c928 .optional.ssa_sign = do_ssa_sign,
929 .optional.ssa_verify = do_ssa_verify,
/optee_os/core/arch/arm/dts/
H A Dstm32mp157c-ev1.dts348 * HW flow control USART3_RTS is optional, and isn't default wired to
H A Dstm32mp15xx-dhcom-som.dtsi514 * - optional on SoMs with SD voltage translator
/optee_os/lib/libutils/isoc/
H A Dbget.doc123 expansion increment. All of these functions are optional (although it
166 optional settings below):
/optee_os/ta/pkcs11/src/
H A Dpkcs11_attributes.c621 uint32_t const *optional = NULL; in create_certificate_attributes() local
658 optional = pkcs11_x509_certificate_optional; in create_certificate_attributes()
674 rc = set_optional_attributes(out, temp, optional, optional_count); in create_certificate_attributes()
/optee_os/core/drivers/crypto/caam/acipher/
H A Dcaam_rsa.c1695 .optional.ssa_sign = NULL,
1696 .optional.ssa_verify = NULL,
/optee_os/core/drivers/crypto/hisilicon/
H A Dhpre_rsa.c1004 .optional = {
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog293 * With TLS 1.3, when a server enables optional authentication of the
301 optional authentication (required would abort the handshake with a fatal
367 optional/none authentication mode, by calling mbedtls_ssl_conf_authmode()
370 support for optional/none with TLS 1.3 as well. Note that the TLS 1.3
372 use authmode none, and to carefully check the results when using optional
1349 * Add a configuration check to exclude optional client authentication
1464 mixed-PSK. Add an optional input PSA_KEY_DERIVATION_INPUT_OTHER_SECRET
3345 that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
3788 where an optional signature algorithms list is expected when the signature
3830 unable to parse keys which had only the optional parameters field of the
[all …]